Popular Topics
Data Analyst
CompTIA Security+
Risk and Compliance
Certified in Cybersecurity Training
CISSP
Certified in Governance
AWS
Developing Generative AI on AWS
Microsoft Office 365 Online
Microsoft Azure
CISSP Exam Preparation Course
Cloud Computing
Administering A SQL Database
CompTIA Cybersecurity Analyst
ITIL 4 Certification
Certified Cloud Security Professional
Azure AI Fundamentals
CompTIA Linux
PECB ISO 31000 Certification
Generative AI Applications on AWS
Penetration Testing Professional
Security Engineering on AWS
Developing AWS Services and Tools
ISO 22301 Certification
Chief Information Security Officer
ITIL 4 Foundation Certification Training
Penetration Testing Certification
Network Defender
AWS Cloud Essentials
SQL Data Models
SQL Server Integration
ISO / IEC 42001 Lead Auditor
Citrix
SQL Data Warehouse
ISO/IEC 42001 Lead Implementer
Microsoft PoerShell
Security on AWS
Cloud Operations on AWS
ISO 22301 Lead Auditor
SharePoint End User
Microsoft Azure Data Fundamentals
Certified Secure Software Lifecycle Professional
CompTIA
Cybersecurity Analyst
Microsoft Azure Certification
SQL Server Performance Tuning
ISO 31000 Certification
Advanced Developing on AWS
SQL Server Performance Optimization
ISO 31000 Risk Manager
Cybersecurity Certification
SQL Database Infrastructure
CompTIA A+ Core 1
CMMC Foundations
Azure Infrastructure Solutions
CompTIA Server
ISO / IEC 42001 Certification
Citrix Endpoint Management
CMMC Certification
Azure AI Solution
CompTIA PenTest
Microsoft Power BI Data Analyst
CMMC Certified Professional
Citrix Cloud with Amazon Web Services
CompTIA Data+
CompTIA Cloud Essentials+
Azure SQL Solutions
Lead Cloud Security Manager
Microsoft Azure for SAP Workloads
Microsoft Azure Administrator
PL-600 Power Platform Solution Architect
CompTIA Project
CompTIA A+ Core 2
Cloud Security Manager
CompTIA Network
Cloud Security Certification
ISO 22301 Lead Implementer
Lead Pen Test Professional
Microsoft Azure Fundamentals Training Certification
ISO 31000 Lead Risk Manager
Microsoft Project 2016 Level 1
CompTIA IT Fundamentals
Cybersecurity Foundation
Microsoft Project 2016: Level 2
CompTIA Cloud
All `Live Courses by Vendor Courses
Filter by Topic
Filter by Vendor
ISO 31000 Lead Risk Manager
The ISO 31000 Lead Risk Manager training course helps participants …
What you'll learn
Demonstrate understanding of risk management principles, as formulated in ISO 31000
Establish, maintain, and continually improve a risk management framework, in accordance with ISO 31000 guidelines
Apply the risk management process, in accordance with ISO 31000 guidelines
Plan risk recording and reporting processes, as well as risk communication activities
Monitor, review, and improve the risk management framework and process based on the outcomes of risk management activities
ISO 22301 Lead Implementer
Disasters have various impacts in organizations. Disasters can result from …
What you'll learn
Explain the fundamental concepts and principles of a business continuity management system (BCMS) based on ISO 22301
Interpret the ISO 22301 requirements for a BCMS from the perspective of an implementer
Initiate and plan the implementation of a BCMS based on ISO 22301
Apply best practices to support the ongoing effectiveness and improvement of the BCMS based on ISO 22301
Interpret the requirements for an ISO 22301 certification audit
What you'll learn
Explain the fundamental concepts and principles of a business continuity management system (BCMS) based on ISO 22301
Interpret the ISO 22301 requirements for a BCMS from the perspective of an auditor
Evaluate the BCMS conformity to ISO 22301 requirements, in accordance with the fundamental audit concepts and principles
Plan, conduct, and close an ISO 22301 compliance audit, in accordance with ISO/IEC 17021-1 requirements, ISO 19011 guidelines, and other best practices of auditing
Manage an ISO 22301 audit program
Security Engineering on AWS
Security is a concern for both customers in the cloud, …
What you'll learn
State an understanding of AWS cloud security based on the CIA triad.
Create and analyze authentication and authorizations with IAM.
Manage and provision accounts on AWS with appropriate AWS services.
Identify how to manage secrets using AWS services.
Monitor sensitive information and protect data via encryption and access controls.
Identify AWS services that address attacks from external sources.
Monitor, generate, and collect logs.
Identify indicators of security incidents.
Identify how to investigate threats and mitigate using AWS services.
Developing Generative AI Applications on AWS
This course is designed to introduce generative AI to software …
What you'll learn
Define the importance of generative AI and explain its potential risks and benefits
Identify business value from generative AI use cases
Discuss the technical foundations and key terminology for generative AI
Identify which prompt-techniques are best-suited for specific models
Identify potential prompt misuses
Describe architecture patterns that can be implemented with Amazon Bedrock for building generative AI applications , and more.
AWS Cloud Practitioner Essentials
This course is for individuals who seek an overall understanding …
What you'll learn
Summarize the working definition of AWS
Differentiate between on-premises, hybrid-cloud, and all-in cloud
Describe the basic global infrastructure of the AWS Cloud
Explain the six benefits of the AWS Cloud
Describe and provide an example of the core AWS services, including compute, network, databases, and storage
Identify an appropriate solution using AWS Cloud services with various use cases
Describe the AWS Well-Architected Framework
Explain the shared responsibility model
Describe the core security services within the AWS Cloud
Describe the basics of AWS Cloud migration
Articulate the financial benefits of the AWS Cloud for an organization’s cost management
Define the core billing, account management, and pricing models
Explain how to use pricing tools to make cost-effective choices for AWS services
AWS Cloud Essentials for Business Leaders
In this course, you will learn the fundamental concepts of …
What you'll learn
Explain the role of information technology (IT) in an organization for business transformation
Explain the customer value proposition for using the cloud across industries
Define key characteristics of cloud computing
Explain the cloud business model
Identify key security practices of cloud computing
Frame the cloud business value using the Cloud Value Framework
What you'll learn
Analyze a monolithic application architecture to determine logical or programmatic break points where the application can be broken up across different AWS services
Apply Twelve-Factor Application manifesto concepts and steps while migrating from a monolithic architecture
Recommend the appropriate AWS services to develop a microservices based cloud-native application
Use the AWS API, CLI, and SDKs to monitor and manage AWS services
Migrate a monolithic application to a microservices application using the 6 Rs of migration
Explain the SysOps and DevOps interdependencies necessary to deploy a microservices application in AWS